/
Navigation
Chronicles
Browse all articles
Explore
Semantic exploration
Research
Entity momentum
Nexus
Correlations & relationships
Story Arc
Topic evolution
Drift Map
Semantic trajectory animation
Posts
Analysis & commentary
Pulse API
Tech news intelligence API
Browse
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
Concept Search
Semantic similarity search
High Impact Stories
Top coverage by position
Sentiment Analysis
Positive/negative coverage
Anomaly Detection
Unusual coverage patterns
Analysis
Rivalry Report
Compare two entities head-to-head
Semantic Pivots
Narrative discontinuities
Crisis Response
Event recovery patterns
Connected
Search: /
Command: ⌘K
Embeddings: large
TEXXR

Chronicles

The story behind the story

days · browse · Enter similar · o open

Microsoft releases a patch for a SharePoint 0-day RCE flaw exploited globally on thousands of on-prem servers and says SharePoint 2016 updates are in the works

Microsoft Corp. warned that hackers are actively targeting customers of its document management software SharePoint

Bloomberg

Discussion

  • NewsMax.com Brian Freeman on x
    Hackers Penetrate Another Microsoft Product
  • @ericjgeller.com Eric Geller on bluesky
    Cyber community is on alert after the revelation of a major vulnerability in Microsoft SharePoint that's being exploited globally, w/ victims incl. govt agencies & infrastructure operators.  —  Initial disclosure: research.eye.security/sharepoint- u...  MSFT guidance: msrc.micros…
  • @justinhendrix Justin Hendrix on bluesky
    “Hackers exploited a major security flaw in widely used Microsoft server software to launch a global attack on government agencies and businesses in the past few days, breaching U.S. federal and state agencies, universities, energy companies and an Asian telecommunications compan…
  • @girlgerms.wtf Jess ‘GirlGerms’ Dodson on bluesky
    Trying not to let work and personal bleed too much into eachother, but want to make sure this gets out and has good reach.  —  If you've got on-prem SharePoint, please go do the things, because this is *nasty*: msrc.microsoft.com/blog/2025/ 07...
  • @yvonnewingett Yvonne Wingett Sanchez on bluesky
    Global hack on Microsoft product hits U.S., state agencies, researchers say
Unknown attackers exploited a “significant vulnerability” in Microsoft's SharePoint collaboration software, hitting targets around world. www.washingtonpost.com/technology/ 2... w/ @ellenwapo.bsky.social …
  • @joemenn Joseph Menn on bluesky
    A global zero-day attack on common SharePoint server software from Microsoft has breached hundreds or thousands of organizations worldwide, including some federal and state agencies, we report at the Post.  It started with a bad patch.  Gift link: wapo.st/3TRrqcP
  • @shadowserver @shadowserver on bluesky
    Alert: SharePoint CVE-2025-53770 incidents!  In collaboration with Eye Security & watchTowr we are notifying compromised parties.  See: research.eye.security/sharepoint- u...  ~9300 Sharepoint IPs seen exposed daily (population, no vulnerability assessment): dashboard.shadowserve…
  • @campuscodi.risky.biz Catalin Cimpanu on bluesky
    There's a new Microsoft SharePoint zero-day getting exploited right now: CVE-2025-53770  —  msrc.microsoft.com/blog/2025/ 07...
  • @msftsecresponse @msftsecresponse on x
    Update on CVE-2025-53770: Microsoft has released a security update for SharePoint Subscription Edition to mitigate active attacks targeting on-premises servers. SharePoint Online is not affected. Customers should apply the update immediately. We are actively working on updates
  • @msftsecresponse @msftsecresponse on x
    Microsoft is aware of active attacks targeting on-premises SharePoint Server customers, exploiting a variant of CVE-2025-49706.  This vulnerability has been assigned CVE-2025-53770.  We have outlined mitigations and detections in our blog.  Our team is working urgently to release…
  • @cisacyber @cisacyber on x
    Malicious actors are exploiting RCE vulnerability CVE-2025-53770 to compromise on-prem SharePoint servers. See our Alert for info & mitigations on exploitation activity, known as #ToolShell. 👉 https://go.dhs.gov/iZZ [image]
  • @cisacyber @cisacyber on x
    We added Microsoft SharePoint server remote code execution vulnerability CVE-2025-53770 to our Known Exploited Vulnerabilities Catalog. Visit https://go.dhs.gov/Z3Q & apply mitigations to protect your org from cyberattacks. #ToolShell [image]
  • @irsdl Soroush Dalili on x
    Well it was possible to bypass the auth patch easily as even a slash after .aspx would jump the check but https://msrc.microsoft.com/... means that there must be a new deserialisation gadget now? According to MS a file is being created and according to @watchtowrcyber machinekey …
  • @bertjancyber Bert-Jan on x
    Sorry to disturb your weekend. There is a SharePoint 0day actively abused. Do not only focus on the rule of MSRC for hunting, other blogs also share different files and folders in use! Additional info: MSRC: https://msrc.microsoft.com/... Blog by @eyesecurity_: https://research.e…
  • @blackorbird @blackorbird on x
    ToolShell Mass Exploitation (CVE-2025-53770) Stealing machine keys to maintain persistent access SharePoint -> The exchange server is the next target https://research.eye.security/ ... [image]
  • @deitaone @deitaone on x
    *HACKERS ATTACKED GOVT AGENCIES, BUSINESSES IN RECENT DAYS: WAPO *HACKERS EXPLOITED FLAW IN MICROSOFT SERVER SOFTWARE: WAPO $MSFT
  • @uk_daniel_card @uk_daniel_card on x
    If you have a SharePoint (hosted or on-premise) please read this! https://research.eye.security/ ...
  • @unit42_intel @unit42_intel on x
    On July 19, Microsoft issued guidance on CVE-2025-53770, a variant of CVE-2025-49706. At the time of posting, a patch is not available. Learn more about Microsoft's customer guidance as the situation evolves: https://msrc.microsoft.com/...
  • @nakashimae Ellen Nakashima on x
    NEW: Global hack on governments and businesses using Microsoft SharePoint servers hits U.S., state agencies, researchers say https://www.washingtonpost.com/ ...
  • @shadowserver @shadowserver on x
    Alert: SharePoint CVE-2025-53770 incidents! In collaboration with @eyesecurity & @watchtowrcyber we are notifying compromised parties. Read: https://research.eye.security/ ... ~9300 Sharepoint IPs seen exposed daily (just population, no vulnerability assessment): https://dashboar…
  • r/cybersecurity r on reddit
    Microsoft releases emergency patches for SharePoint RCE flaws exploited in attacks
  • r/blueteamsec r on reddit
    Customer guidance for SharePoint vulnerability CVE-2025-53770 |  Microsoft is aware of active attacks targeting on-premises SharePoint Server customers. …